[] NeoSense

Grsecurity Kernel Patch 1.9.4 (Linux Kernel) - Memory Protection

Author: Guillaume PELAT
type: local
platform: linux
port: 
date_added: 2002-05-17 
date_updated: 2016-09-04 
verified: 1 
codes: CVE-2002-1826;OSVDB-59770 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/4762/info

An attacker with root access may be able to write to kernel memory in spite of the security patch provided by grsecurity. The patch operates by redirecting the write() system call, when it is being used to write to a memory device. Unfortunately, there are other methods that can be used to write to kernel memory (such as mapping the device to memory using mmap()).

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/21458.tgz